botnetnetworkDDoScompliancemalwareBECIDSphishingzero-dayIPbusinesscontinuityvishingDarkWebinsiderthreatProofpointcryptographyOSSyssecAdminfirewalltrainingspoofingCyberDefensepacketransomwaresecurityawarenesspentestriskassessmentWISPspywareincidentresponseencryptionantivirusIOCexploitSecurityOperationsAPTavailabilitydefenseevasionpasswordbreachCIAtriadescalationwormrootkitFTPidentitytheftVPNvirusconfidentialityhackerriskpassphrasebugPHIDefense-in-depthadminHIPAAintegritysmishingspamsocialengineeringcyberattackincidentresilienceCyberSecurityIPSEDRvulnerabilityMFAIoTsecuritypolicyPIIbotnetnetworkDDoScompliancemalwareBECIDSphishingzero-dayIPbusinesscontinuityvishingDarkWebinsiderthreatProofpointcryptographyOSSyssecAdminfirewalltrainingspoofingCyberDefensepacketransomwaresecurityawarenesspentestriskassessmentWISPspywareincidentresponseencryptionantivirusIOCexploitSecurityOperationsAPTavailabilitydefenseevasionpasswordbreachCIAtriadescalationwormrootkitFTPidentitytheftVPNvirusconfidentialityhackerriskpassphrasebugPHIDefense-in-depthadminHIPAAintegritysmishingspamsocialengineeringcyberattackincidentresilienceCyberSecurityIPSEDRvulnerabilityMFAIoTsecuritypolicyPII

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
  1. botnet
  2. network
  3. DDoS
  4. compliance
  5. malware
  6. BEC
  7. IDS
  8. phishing
  9. zero-day
  10. IP
  11. business continuity
  12. vishing
  13. Dark Web
  14. insider threat
  15. Proofpoint
  16. cryptography
  17. OS
  18. SyssecAdmin
  19. firewall
  20. training
  21. spoofing
  22. Cyber Defense
  23. packet
  24. ransomware
  25. security awareness
  26. pentest
  27. risk assessment
  28. WISP
  29. spyware
  30. incident response
  31. encryption
  32. antivirus
  33. IOC
  34. exploit
  35. Security Operations
  36. APT
  37. availability
  38. defense evasion
  39. password
  40. breach
  41. CIA triad
  42. escalation
  43. worm
  44. rootkit
  45. FTP
  46. identity theft
  47. VPN
  48. virus
  49. confidentiality
  50. hacker
  51. risk
  52. passphrase
  53. bug
  54. PHI
  55. Defense-in-depth
  56. admin
  57. HIPAA
  58. integrity
  59. smishing
  60. spam
  61. social engineering
  62. cyber attack
  63. incident
  64. resilience
  65. Cyber Security
  66. IPS
  67. EDR
  68. vulnerability
  69. MFA
  70. IoT
  71. security policy
  72. PII